Thursday 18 July 2013

Computer Awareness-21

   1.      ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
a.      The platform
b.     Application software
c.      Operating system
d.     The motherboard
   2.     Servers are computers that provide resources to other computers connected to:
a.      Mainframe
b.     Network
c.      super computer
d.     client
   3.     A device that operates under the control of another device is called?
a.      Stem
b.     Slave
c.      Simulator
d.     Emulator

   4.     URL stands for?
a.      Universal Research List
b.     Universal Resource List
c.      Uniform Resource Locator
d.     Uniform Research Locator
   5.     A database management system (DBMS) is a?
a.      hardware system used to create, maintain and provide controlled access to a data- base
b.     hardware system used to create, maintain, and provide uncontrolled access to a database.
c.      software system used to create, maintain, and provide uncontrolled access to a database.
d.     software system used to create, maintain and provide controlled access to a database.
   6.     The design of the network is called the network?
a.      Architecture
b.     Server
c.      Transmission
d.     Type
   7.     A Proxy server is used for which of the following?
a.      To provide security against unauthorized users
b.     To process client requests for web pages
c.      o provide TCP/IP
d.     To process client requests for database access
   8.     When data changes in multiple lists and all lists are not updated, this causes?
a.      data redundancy
b.     information overload
c.      duplicate data
d.      data inconsistency
   9.     _____ are words that a programming language has set aside for its own use?
a.      Control words
b.     Reserved words
c.      Control structures
d.     Reserved keys
   10. The most frequently used instructions of a computer program are likely to be fetched from?
a.      the hard disk
b.     cache memory
c.      RAM
d.     Registers
   11. What is the shortcut key to "Undo" the last action in a document?
a.      Ctrl + X
b.     Ctrl + Y
c.      Ctrl + Z
d.     Ctrl + U
   12. You must install a(n) ________ on a network if you want to share a broadband Internet connection.
a.      Router
b.     Modem
c.      Node
d.     Cable
   13. The errors that can be pointed out by the compiler are?
a.      Syntax errors
b.     Semantic errors
c.      Logic errors
d.     System errors
   14. Granting an outside organization access to internet web pages is often implemented using a(n)?
a.      Extranet
b.     Intranet
c.      Internet
d.     Hacker
   15. Which term identifies a specific computer on the web and the main page of the entire site?
a.      URL
b.     Web site address
c.      Hyperlink
d.     Domain name
   16. The code that relational database management systems use to perform their database task is referred to as?
a.      QBE
b.     SQL
c.      OLAP
d.     Sequel Server
   17. Chip is a common nickname for a(n)?
a.      Transistor
b.     Resistor
c.      integrated circuit
d.     semiconductor
   18. Programs such as Internet Explorer that serve as navigable windows into the Web are called
a.      Hypertext
b.     Networks
c.      Internet
d.     Web browsers
   19. What menu is selected to cut, copy and paste?
a.      File
b.     Tools
c.      Special
d.     Edit
   20. The most important or powerful computer in a typical network is?
a.      Desktop
b.     network client
c.      network server

d.     network station

No comments: